arxiv: v1 [cs.ni] 4 Aug 2013

Size: px
Start display at page:

Download "arxiv:1308.0768v1 [cs.ni] 4 Aug 2013"

Transcription

1 MonoStream: A Minimal-Hardware High Accuracy Device-free WLAN Localization System arxiv:8.768v [cs.ni] 4 Aug ABSTRACT Ibrahim Sabek Comp. and Sys. Eng. Dept. Alexandria University, Egypt ibrahim.sabek@alexu.edu.eg Device-free (DF) localization is an emerging technology that allows the detection and tracking of entities that do not carry any devices not participate actively in the localization process. Typically, DF systems require a large number of transmitters and receivers to achieve acceptable accuracy, which is not available in many scenarios such as homes and small businesses. In this paper, we introduce MonoStream as an accurate single-stream DF localization system that leverages the rich Channel State Information (CSI) as well as MIMO information from the physical layer to provide accurate DF localization with only one stream. To boost its accuracy and attain low computational requirements, MonoStream models the DF localization problem as an object recognition problem and uses a novel set of CSI-context features and techniques with proven accuracy and efficiency. Experimental evaluation in two typical testbeds, with a side-by-side comparison with the state-of-the-art, shows that MonoStream can achieve an accuracy of.9m with at least 6% enhancement in median distance error using a single stream only. This enhancement in accuracy comes with an efficient execution of less than ms per location update on a typical laptop. This highlights the potential of MonoStream usage for real-time DF tracking applications. Categories and Subject Descriptors C..4 [Computer-Communication Networks]: Distributed Systems; H..4 [Information Storage and Retrieval]: Systems and Software General Terms Algorithms, Experimentation, Measurement, Performance, Security Keywords Device-free localization, detection and tracking, physicallayer based localization. Moustafa Youssef Wireless Research Center E-JUST, Egypt moustafa.youssef@ejust.edu.eg Access Point (AP) Line-of-sight Monitoring Point (MP) Reflected or Diffracted Signal Figure : Typical architecture of a DF WLAN localization system.. INTRODUCTION Many localization systems have been proposed over the years including the GPS system [4], RF-based systems [, 7], and infrared-based systems []. All these systems require that the tracked entity carries a device. On the other hand, device-free (DF) passive localization [6] is based on using typical wireless networks to detect and track entities that do not carry any devices nor participate actively in the localization process. It depends on the fact that the RF signal strength is affected by human motion. DF localization can be used in many applications including smart homes, intrusion detection, medical care, and traffic estimation. A typical DF system (Figure ) consists of signal transmitters (such as standard access points (APs)), monitoring points (MPs) (such as standard laptops or APs themselves), and an application server for processing the received signal strength from the MPs to detect and localize events. Current approaches for DF localization include radarbased systems, e.g. [,, 6], computer vision based systems, e.g. [, 9] and Radio Tomographic Imaging (RTI), e.g. []. These systems, however, need special hardware and high installation cost. On the contrary, a

2 number of DF localization systems have been proposed that operate in standard WiFi networks, e.g. Nuzzer [6] and Rasid [8], without requiring any additional equipment. Therefore, these systems provide a value added-service on top of the wireless infrastructure, just based on the reported signal strength from the MAC layer. While these systems provide lower cost localization services, they still require a large number of streams (a data stream is the data received from one AP at one MP), which limits their applicability and accuracy in a large class of scenarios, such as in homes and small bussinesses, where usually a small number, typically one AP is installed. In this paper, we introduce MonoStream as a highaccuracy limited-hardware device-free WLAN localization system. MonoStream is designed to work with a low number of streams, typically one (i.e. one AP and one MP). To compensate for the loss of information due to reducing the number of streams, MonoStream leverages the detailed physical layer information of WiFi networks. In particular, the IEEE 8.n standard uses the OFDM modulation, where a wide channel is divided into several orthogonal sub-carriers each arriving at the location of the receiver with distinct values of phase and magnitude (denoted as Channel State Information (CSI)). This provides rich information to detect the effect of human motion on the magnitude of each subcarrier, as compared to a single signal strength value that has been used with the current approaches. In addition, the IEEE 8.n devices use the MIMO technology, which further provides more information about each antenna pair from the transmitter to the receiver. To further address the noisy wireless channel and the rich CSI information, MonoStream models the DF localization problem as an object recognition problem, where it treats the CSI profile at different locations as images and extracts novel features that can capture small variations in the effect of the human standing at different locations in the area of interest on the CSI vectors. To reduce the computational cost of the proposed techniques on the application server, MonoStream employs a joint boosting technique [9] to scale up for a large number of features and locations. Experimental evaluation, in two typical testbeds using a single access point and a single laptop, shows that MonoStream can achieve a localization accuracy of less than.9m. This corresponds to at least 6% enhancement in median distance error over the state-of-the-art DF localization systems using the same environment. This comes with a realtime location update rate that requires less than ms per location estimate. The rest of the paper is organized as follows: Section introduces a brief background about the physical layer information and its properties that can be used to identify the human location. Following that, Section presents the MonoStream system details. Section 4 describes the performance evaluation of the proposed system, comparing it to the state-of-the-art DF localization systems. Then, we present the related work in section, and discuss the other points related to the system in section 6. Finally, we conclude the paper and give directions for future work in section 7.. BACKGROUND AND CSI CHARACTER- IZATION In this section, we briefly present the OFDM modulation and MIMO technologies as well as the basic information we rely on to build the core system blocks.. Channel State Information (CSI) and MIMO Technology Many IEEE 8. standards (e.g. a/g/n) use OFDM modulation that transmits signals over several orthogonal frequencies called sub-carriers. Each signal transmitted on a sub-carrier has a different signal strength and phase. Typical wireless cards provide only a single received signal strength (RSS) value representing the superposition of information from all sub-carriers. Recently, some IEEE 8.n standard based cards available in the market provide detailed magnitude and phase information about the different sub-carriers represented as Channel State Information (CSI). In particular, the Intel card reports the CSI for groups of sub-carriers, which is about one group for every sub-carriers for the MHz channels operating on the.4ghz frequency [7]. The IEEE 8.n nodes also use another technology which is Multiple-Input Multiple-Output (MIMO) where there are multiple transmitter and receiver antennas. Each combination of receiver and transmitter antennas can be considered as a separate virtual link/stream. Therefore, MIMO technology provides multiple virtual streams between a transmitter-receiver pair and hence has the potential of providing better accuracy.. CSI Observations In this section, we show some of our observations on the CSI that we base the system components on. For space constraints, we focus on the magnitude of the received signal strength (RSS) in this paper and leave the phase information to a future paper. Figure shows the (profile) for one virtual link, i.e. a transmitter antenna-receiver antenna pair, over different packets (each packet is represented by a line) for the sub-carriers. We can notice from the figure that the CSI values for each stream form one or more clusters. Figure shows the CSI profile for the silence case

3 (a) Silence (no human) (b) Human at Location (c) Human at Location Figure : s for different cases. 6 4 (a) Link with one cluster. 4 (b) Link with two clusters. Figure : CSI profile for different virtual links (a link is one transmitter-receiver antennas pair). Each line represents the of one packet over all subcarriers. Different lines represent different packets. 4 (f) Figure 4: CSI information for two adjacent locations (separated by m) overlapped on the same figure. as well as the presence of the human at two separated locations for one virtual link. The figure shows that the information can be used to identify the human presence as well as determine her location. Figure 4 shows the CSI profile for two adjacent locations (separated by meter) for one virtual link. The figure shows that there is still some difference in the CSI magnitude information between the two locations. Although the RSS distribution of each sub-carrier of each cluster at each location can be modelled by a Gaussian mixture [, ], the large overlap between the CSI profiles and the smoothness effect introduced by the Gaussian mixture leads to aliasing between adjacent locations, which reduces accuracy. Instead, MonoStream takes a novel approach of treating the CSI profile of a given link at a given location (e.g. figures a or b) as an image and employs object recognition techniques with proven accuracy and efficiency to capture the small variations in the profile between adjacent locations.. THE MONOSTREAM SYSTEM In this section, we give the details of MonoStream. We start by an overview of the system architecture followed by the system model, features construction, and system details.. Overview Figure shows the system architecture. We have two phases of operation: offline and online. During the offline phase, a person stands at different locations in the area of interest. For each location, CSI values are recorded for all transmitter-receiver pairs (i.e. virtual links) and used to extract features and to train a set of classifiers. During the online phase, the system uses the collected CSI information to estimate the persons unknown location. The system is implemented through a set of modules: The CSI Preprocesser extracts s from sent packets for each virtual link and filters outlier values. The CSI-context Filters Builder constructs the filters (during the offline phase) used by the Features Extraction Module to extract the features from the CSI information. These features are used by the Joint Booster Classifier Trainer during the offline phase to efficiently train a set of binary classifiers, one for each location in the area of interest. The trained classifiers are used during the online phase to provide a list of active locations with positive human detection along with the associated confidence. Finally, the Location Estimator fuses the output of the different classifiers to estimate the entity location both in the discrete and continuous space.

4 Transmitter antenna (n) MonoStream CSI Preprocesser CSI Extractor CSI Filter CSI-context Filters Builder Features Extraction Module CSI feature vectors Location Estimator f f f.. fn CSI-context filters Joint Boosting Classifiers Trainer Discrete-Space Estimator Continuous-Space Estimator Candidate locs + confidence Joint Boosting Classifiers S Classifiers parameters Estimated Location Figure : MonoStream system architecture. Shaded blocks represent modules that run in the offline phase. Signal amplitude s Receiver antenna (m) 6 4 Figure 6: Matrix representing CSI information (fingerprint data) at a particular location from all virtual links over all carriers. The matrix indices represent the transmitter and receiver antennas while the content represents the CSI profile.. System Model Assume an area of interest divided into L fingerprint, i.e. training, locations. This area is covered by only one AP with n MIMO antennas and one MP (e.g. a laptop) with a wireless card having m MIMO antennas. This leads to n.m virtual links between the transmitter and receiver. Using the OFDM modulation, each transmitted packet is sent using f sub-carriers on each of the n antennas. This leads to a total of n.m.f virtual streams between each physical transmitter-receiver pair, as compared to only only stream with the traditional RSS-based techniques [6, 7]. Figure 7: Context-filter examples: each filter is represented by a rectangle of random size over the CSI profile of a single virtual link (transmitter-receiver pair). During the training phase, a human stands at each location l L and the CSI of a set of packets sent by the AP are recorded at the MP. The CSI information of all packets corresponding to location l is represented by a matrix (Figure 6) of size n.m, whose entry (i, j) represents the CSI profile (as in Figure ) of the virtual link representing the packets from transmitter antenna i to receiver antenna j. This rich information is what allows MonsStream to achieve high accuracy with just a single AP-MP pair.. Features and Context Filters This section discusses our proposed CSI-based features that will be used to train the discrimination model 4

5 used to differentiate between different locations. To capture small variations in the CSI profiles between adjacent locations, MonStream borrows techniques from the object recognition domain [, 8], where the CSI profile of a particular virtual link at a certain location is treated as an image. Random sampling of features within these CSI-profile images is used to reduce complexity as well as increase the discrimination between adjacent locations. In particular, we define a context filter on a CSI profile as a rectangular mask whose width is determined by the range of sub-carriers covered; and height determined by the range of values covered (Figure 7). For example, we can define a context filter that covers sub-carriers from to, and CSI magnitudes from to. A set of d context filters T = {t i }; i =,..., d is then defined by selecting rectangles with different random sizes (width and hight uniformly distributed over the range) over the CSI profiles in the matrix. These random filters, once selected, are then fixed over the different locations. Let λ t be the number of packets that fall inside a CSI-context filter t T. Instead of using λ t s directly, MonoStream uses Haar-like [] features to increase the feature space and hence lead to better accuracy. Specifically, for two different CSI-context filters t i, t j T, the associated feature λ i,j is obtained as λ i λ j. Note that there are ( d ) different combinations of features to choose from, each representing a pair of filter indices (i, j). The choice of d represents a trade-off between accuracy and efficiency as quantified in the Evaluation Section. This feature space is further reduced by selecting the best features during the classifier training phase..4 Classifier Training Module Once the features are extracted, the goal of the Classifier Training Module is to train a binary classifier for each location to differentiate it from all other fingerprint locations based on the training data. To balance computational efficiency and accuracy, we adopt an AdaBoost-based classifier [,, 9]. AdaBoost is an iterative technique that adds a new simple weak classifier in each iteration. At each round, samples that are misclassified from previous rounds are assigned higher weights so that the current weak classifier focuses on disambiguating them. A weight is assigned to each classifier and the final classifier is defined as the linear combination of the classifiers from each iteration. AdaBoost can be regarded as a feature selection technique that selects the most discriminant g features, where g is the number of iterations. Therefore, this further reduces the number of features, and hence is more computa- The key advantage of a Haar-like feature over other features is its calculation speed. tionally efficient. We adopt decision stumps as our weak binary classifiers. A decision stump is defined by three parameters: a feature that it classifies, a threshold on the feature value, and the sign of the decision (whether it takes a positive or negative value if the feature value is above the threshold). Therefore, implementing our weak classifier requires just one condition check, which is extremely efficient. Furthermore, instead of independently training the classifier of each location, we use a joint boosting approach that selects the best features that can be used to discriminate between the largest subset of locations [9] in each iteration. For a given performance level, joint boosting reduces the training overhead to logarithmic in the number of locations (as features are shared between locations), increases accuracy, reduces running time, and avoids over-fitting of the training samples. This last property is of specific importance in DF localization due to the noisy and dynamic nature of the wireless channel.. Location Estimator The purpose of this module is to estimate the actual user location given a received CSI vector/profile S. We start by assuming that the user is standing at one of the discrete fingerprint locations then we generalize this to an arbitrary location in the next subsection... Discrete-space estimator The extracted features from the CSI vector are processed by the Joint Boosting Classifiers to generate the binary decision for each location and its associated confidence. For a classifier for fingerprint location l L, let d l be if the classifier detects that a person is present at this location and - otherwise. In addition, let c l the decision confidence of that classifier. In order to fuse the output of the different classifiers, we adopt a probabilistic approach where we want to find the location l in the fingerprint L that maximizes the probability P (l S). That is: l = arg max P (l S) () l Using Baysian inversion, this can be represented as: l = arg max l P (S l).p (l) P (S) () Assuming all locations are equally likely and noting that P (S) is independent of l, Equation becomes: l = arg max P (S l) () l If the probabilities distribution of P (l) is known, it can be used directly in Equation

6 We estimate P (S l) as a function of the classifiers confidence for the location with positive detection as: c l P (S l) = (4) c i i; d i= To further enhance the accuracy, MonoStream calculates the probability based on a sequence of packets during a time window w..6 Continuous-space estimator The previous estimator will always return one of the fingerprint locations, even if the entity is standing in a location that does not coincide with any of the fingerprint locations. To further enhance accuracy, the continuous space estimator uses a spatial averaging technique. The spatial averaging technique estimates the location as the weighted average of the most probable k locations, where each location is weighed by its probability (Equation 4) normalized by the sum over all probabilities. Note that using the continuous-space estimator, MonoStream can achieve accuracy that is better than the fingerprint grid spacing. 4. PERFORMANCE EVALUATION In this section, we analyze the performance of MonoStream and compare it to the state-of-the-art DF WLAN localization systems [7, 6, ]. We start by describing the experimental setup and data collection. Then, we analyze the effect of different parameters on the system performance. We end the section by a comparison with the state-of-the-art. 4. Testbeds and Data Collection We conducted two experiments with different testbeds (Figure 8). The first testbed covers a typical apartment with an area of approximately m (about 77 sq. ft.) while the second testbed represents a residential apartment with an area of 4m (about 8 sq. ft.). Both testbeds are with typical furniture. The area was covered by a single Cisco Linksys X AP and a Dell Adamo XPS laptop as a MP. The laptop has an Intel card that can provide CSI information [7]. The fingerprint is constructed for () different locations for the first (second) testbed, uniformly distributed over the testbed area. An independent test set of 7 locations are chosen randomly between the training locations at different times of day using different persons from the training set. Table shows the default values for the different parameters. For the running time estimation, all experiments were performed on a Dell Latitude E6 with an Intel Core i7 CPU running at.67 GHz and having 8GB RAM. Due to space constraints, we give the details of the first testbed and summarize the results of the second. (a) Testbed. (b) Testbed. Figure 8: Testbeds for the experiment with training locations marked as red crosses and testing locations marked as green circles. Parameter Default Meaning value m Num. of receiver antennas f Num. of sub-carriers g 7 Num. of boosting rounds w Num. of packets per loc. est. k 6 Spatial avg. window Table : Default parameters values. 4. Effect of Different Parameters 4.. Effect of the number of receiver antennas (m) Figure 9 shows the effect of changing the antennas combinations on the median distance error. The figure shows that different combinations lead to different accuracy. This is due to the noisy wireless channel and the different multipath effects encountered by the packets received at the different antennas. This means that using more antennas does not necessarily lead to better accuracy. The good news is that the SNR associated with the antennas can be used to determine the best combination. For the rest of this section, we use an- 6

7 Median distance error (m) a b c a-b-c a-c b-c a-b Combination of antennas Median distance error (m)... Number of sub-carriers (f) Figure 9: Effect of different combinations of receiver antennas (a, b, c). Median distance error (m)... 4 Number of packets (w) Figure : Effect of the number of packets used in one location estimate (w). tennas a and c (i.e. m = ) as they lead to the best accuracy. 4.. Effect of number of packets used in estimation (w) Figure shows the effect of increasing the number of packets used in the estimation process. The figure shows that as the number of packets increases, the accuracy increases. However, increasing w increases the latency. Therefore, there is a tradeoff that a designer needs to balance based on her needs. Setting w = gives high accuracy of.9m with reasonable latency. 4.. Effect of processed sub-carriers (f) Figure shows the effect of increasing the number of sub-carriers on the median distance error. For a specific number of sub-carriers (f), we choose a number of random subsets of size f from the available sub- Figure : Effect of the number of sub-carriers used. Error bars represent the standard deviation over different randomly selected sets of sub-carriers. Median distance error (m) Number of averaged locations (k) Figure : Effect of the number of averaged locations (k). carriers and draw both the average and standard deviation of performance. The figure shows that, in general, increasing the number of sub-carriers leads to better accuracy. This due to the increased amount of available information. Therefore, a designer can tune the the accuracy-computational complexity if needed Effect of number of averaged locations (k) Figure shows the effect of increasing the number of averaged locations (k) for the continuous-space estimator. The figure shows that increasing the number of averaged locations reduces the median distance error until it saturates around k =. 4.. Effect of number of CSI-context filters (d) Figure shows the effect of increasing the number CSI-context filters. The figure shows that increasing 7

8 Median distance error (m) Number of CSI-context filters (d) Figure : Effect of the number of CSI-context filters (d). Error bars represent the standard deviation over different random selection of filters. the number of CSI-context filters reduces the median distance error. We pick d = as it balances accuracy and computational overhead Effect of number of boosting rounds (g) Figures 4a and 4b show the effect of the number of boosting rounds on the training time and online phase performance respectively. The figure shows that the training and estimation time increases linearly with the boosting rounds. Simultaneously, the accuracy increases with the increase of the boosting rounds until it saturates at R = 7. Therefore, we take this value as the default value. 4. Comparison with the State-of-the-Art Figure a compares the CDF of distance error for the MonoStream system to the Deterministic [7] and Probabilistic Nuzzer [6] traditional DF systems 4 designed for multiple streams as well as the MonoPhy system [] designed for a single stream based on a Gaussian mixtures approach. Table summarizes the results. The results show that MonoStream has the best accuracy with an enhancement of at least 6.% in median distance error over the best state-of-the-art technique in a single stream environment. Figure b shows the running time of the different technique. The figure shows that the accuracy advantage of MonoStream does not compromise efficiency; Only ms are required per location update, which shows that MonoStream can run in realtime. 4 These techniques do not use the CSI information but rather the combined RSS only as reported by the MAC layer. Avg train. time / FP loc. (sec) Median distance error (m) Number of boosting rounds (g) (a) Offline training phase. Accuracy Running time Number of boosting rounds (g) (b) Online phase. Avg. running time/ loc. est. (ms) Figure 4: Effect of the number of boosting rounds on performance.. RELATED WORK Device-free tracking schemes have advanced over the year including: radar-based, camera-based, sensors-based, and WLAN-based systems. In the radar-based systems, pulses of radio waves are transmitted into the area of interest and based on measuring the received reflections, objects could be tracked. Several approaches have been presented in this class including ultra-wideband (UWB) systems [], doppler radar [], and MIMO radar systems [6]. On the other hand, camera-based tracking systems are based on analyzing a set of captured images to estimate the current locations of objects of interest [, 9]. Sensor-based systems use especially installed sensor nodes to cover the area of interest. For example, [] applies radio tomographic techniques to the readings of a dense array of sensors to obtain accurate DF tracking. All these technologies share the requirement of in- 8

9 Table : Performance summary for the different systems under the two testbeds using median distance error and running time as the metric. Numbers between parenthesis represent the percentage difference from MonoStream. System Testbed Testbed Median Running Median Running error time error time MonoStream.9m.64ms.4m 6.8ms MonoPHY [].6m (%).6ms (76.%).9m (6.%) 4.44ms (7.7%) Prob. Nuzzer [6].6m 4.6ms.m.47ms (6.87%) Det. Nuzzer [7].6m (69.9%) (8.98%).4ms (9.94%) (4.8%).9m (64.%) (78.68%).67ms (89.74%) Cum. Dist. Fun. (CDF) Avg. run. time /loc. estimate (ms) MonoStream MonoPHY [] Prob. Nuzzer [6] Determ. Nuzzer [7] Distance error (m) (a) CDF of distance error. Features extraction Classification Location estimation Total time MonoStream MonoPHY (b) Running time. Prob. Nuzzer Det. Nuzzer Figure : Comparison with the state-of-the-art techniques. stalling special hardware to be able to perform DF tracking, which reduces their scalability in terms of cost and coverage area. In contrast, WLAN DF tracking aims at exploiting the already installed WLAN. DF localization in WLANs was first introduced in [6] along with feasibility experiments in a controlled environment. Several papers followed the initial vision to provide different techniques for detection and tracking of a single entity [4, 4, 8, 7]. Tracking multiple entities was proposed in SPOT [] based on a probabilistic energy minimization framework that combines a conditional random field with a Markov model to capture both of spatial and temporal relations between active locations. All these techniques rely only on the reported signal strength from the MAC layer and hence require a large number of streams, i.e. APs and MPs, to provide acceptable accuracy. The closest work to ours is the MonoPhy system [] that models the CSI information using a Gaussian mixtures approach. However, since the CSI profiles in adjacent locations are usually similar, the smoothness effect of the Gaussian mixture leads to aliasing in the CSI space between adjacent locations, which reduces accuracy. The novel approach adopted from the object recognition domain allows the MonoStream system to capture the small variations in RSS between adjacent locations and maintain high efficiency. 6. DISCUSSION 6. Accuracy MonoStream accuracy is based on three factors: () leveraging the rich CSI information, () sampling a large number of features that capture small variations between adjacent locations, and () using a joint boosting technique that selects the combined best features over all locations and avoids over training. These factors allow it to tolerate a low number of streams and achieve high accuracy. 6. Efficiency The increase in accuracy of MonoStream does not come at an increased complexity. MonoStream employs a number of techniques to enhance its efficiency and trade the accuracy with efficiency as quantified in the evaluation section. These include: () using easy-tocompute Haar-like features, () using decision stumps 9

10 that can be computed using only a single comparison check, and () adopting an joint boosting approach that selects the best features, reduces training overhead and reduces the feature space. This in turn reflects in reducing the running time of the algorithm. Theoretically, the training complexity of the joint boosting classifier is O(g. L ) [9] whereas the location estimation complexity is O(g. L ). 6. Multi-entity Tracking Although all results in the paper focus on a single entity, the extension to the multiple entities case is straight forward. Current approaches for multi-entity DF localization, e.g. [], can be applied directly to the MonoStream system. 6.4 Dynamic Changes in the Environment Another important aspect of the practical deployment of MonoStream is handling the dynamic changes in the environment which may require re-calibration of the area of interest. Different approaches can be applied to capture these dynamic changes including dynamically updating the stored parameters, e.g. using anomaly detection techniques as in [8], and using CAD tools for DF systems, e.g. as in []. 7. CONCLUSION We tackled the device-free passive localization problem using physical layer information supported by WLAN standards. We presented the MonoStream system based on a novel set of CSI-context features that can capture minimal variations in the CSI profiles between adjacent locations. Combined with an efficient AdaBoosting classifier, this allows us to achieve both accurate and efficient DF localization using only a single transmitter and receiver. Experimental evaluation in two typical WiFi testbeds shows that MonoStream can achieve.9m median distance error, which is better than the state-of-the-art techniques by at least 6%. This enhancement in accuracy comes with an efficient execution of less than ms per location update on a typical laptop. This highlights the promise of MonoStream for real-time DF tracking applications. Currently, we are expanding MonoStream in multiple directions including integrating the CSI phase information, multiple entities tracking, and entity identification. 8. REFERENCES [] H. Abdel-Nasser, R. Samir, I. Sabek, and M. Youssef. MonoPHY: Mono-Stream-based Device-free WLAN Localization via Physical Layer Information. In IEEE Wireless Communications And Networking Conference, WCNC,. [] P. Bahl and V. N. Padmanabhan. RADAR: An In-Building RF-based User Location and Tracking System. In IEEE Infocom, pages ,. [] A. Eleryan, M. Elsabagh, and M. Youssef. Synthetic generation of radio maps for device-free passive localization. In GLOBECOM,. [4] P. Enge and P. Misra. Special Issue on Global Positioning System. In Proceedings of the IEEE, January 999, pages 7, 999. [] Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. In Proceedings of the Second European Conference on Computational Learning Theory, EuroCOLT 9, pages 7. Springer-Verlag, 99. [6] A. M. Haimovich, R. S. Blum, and L. J. Cimini. MIMO Radar with Widely Separated Antennas. IEEE Signal Processing Magazine, pages 6 9, 8. [7] D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool Release: Gathering 8.n Traces with Channel State Information. ACM SIGCOMM CCR, 4():, Jan.. [8] A. E. Kosba, A. Saeed, and M. Youssef. RASID: A Robust WLAN Device-free Passive Motion Detection System. In PerCom, pages 8 89,. [9] J. Krumm, S. Harris, B. Meyers, B. Brumitt, M. Hale, and S. Shafer. Multi-Camera Multi-Person Tracking for Easyliving. In Third IEEE International Workshop on Visual Surveillance,. [] T. Leung and J. Malik. Representing and Recognizing the Visual Appearance of Materials using Three-dimensional Textons. Int. J. Comput. Vision, 4():9 44, June. [] A. Lin and H. Ling. Doppler and direction-of-arrival (DDOA) radar for multiple-mover sensing. IEEE Trans. Aerosp. Electron. Syst., 4(4):496 9, 7. [] S. Mahamud, M. Hebert, and J. Shi. Object Recognition using Boosted Discriminants. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ), with CD-ROM, 8-4 December, Kauai, HI, USA, page. IEEE Computer Society,. [] T. B. Moeslund, A. Hilton, and V. Krger. A survey of advances in vision-based human motion capture and analysis. Computer Vision and Image Understanding, 4(-):9 6, 6. [4] M. Moussa and M. Youssef. Smart Devices for Smart Environments: Device-free Passive

11 Detection in Real Environments. In IEEE PerCom Workshops, 9. [] I. Sabek and M. Youssef. Multi-entity Device-Free WLAN Localization. In IEEE Global Communications Conference, GlobeCom,. [6] M. Seifeldin, A. Saeed, A. E. Kosba, A. El-Keyi, and M. Youssef. Nuzzer: A large-scale device-free passive localization system for wireless environments. IEEE Transactions on Mobile Computing,. [7] M. Seifeldin and M. Youssef. A Deterministic Large-scale Device-free Passive Localization System for Wireless Environments. In PETRA : Proceedings of the rd International Conference on Pervasive Technologies Related to Assistive Environments, pages 8,. [8] J. Shotton, J. M. Winn, C. Rother, and A. Criminisi. TextonBoost: Joint Appearance, Shape and Context Modeling for Multi-class Object Recognition and Segmentation. In ECCV (), pages, 6. [9] A. Torralba, K. P. Murphy, and W. T. Freeman. Sharing features: efficient boosting procedures for multiclass object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, volume, pages , Washington, DC, June 4. [] D. Tse and P. Viswanath. Fundamentals of wireless communication. Cambridge University Press, New York, NY, USA,. [] P. A. Viola and M. J. Jones. Rapid Object Detection using a Boosted Cascade of Simple Features. In CVPR (), pages 8,. [] R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. In ACM Transactions on Information Systems, pages 9, 99. [] J. Wilson and N. Patwari. Radio Tomographic Imaging with Wireless Networks. In tech. rep. University of Utah, 8. [4] J. Yang, Y. Ge, H. Xiong, Y. Chen, and H. Liu. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. In The 9th Conference on Computer Communications, INFOCOM, pages 9,. [] Y. Yang and A. E. Fathy. See-through-wall imaging using ultra-wideband short-pulse radar system. In IEEE Antennas Propag. Soc. Int. Symp,. [6] M. Youssef, M. Mah, and A. Agrawala. Challenges: Device-Free Passive Localization for Wireless Environments. In MobiCom 7: Proceedings of the th annual ACM international conference on Mobile computing and networking, pages 9. New York, NY, USA, 7. [7] M. A. Youssef and A. Agrawala. The Horus WLAN Location Determination System. In ACM MobiSys, pages 8,.

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Ahmed E. Kosba, Ahmed Abdelkader Department of Computer Engineering Faculty of Engineering, Alexandria University, Egypt

More information

New Insights into WiFi-based Device-free Localization

New Insights into WiFi-based Device-free Localization New Insights into WiFi-based Device-free Localization Heba Aly Dept. of Computer and Systems Engineering Alexandria University, Egypt heba.aly@alexu.edu.eg Moustafa Youssef Wireless Research Center Egypt-Japan

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2404-2408 (2015) ISSN: 0975-0290

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2404-2408 (2015) ISSN: 0975-0290 2404 Nuzzer algorithm based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment R.Ranjani Assistant Professor, Department of Computer Science and Engineering,

More information

Challenges: Device-free Passive Localization for Wireless Environments

Challenges: Device-free Passive Localization for Wireless Environments Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef Dept. of Computer Science University of Maryland College Park, MD 2742, USA moustafa@cs.umd.edu Matthew Mah Dept.

More information

Device-Free Passive Localization

Device-Free Passive Localization Device-Free Passive Localization Matthew Mah Abstract This report describes a Device-Free Passive Localization System (DfP). The system provides a software solution over nominal WiFi equipment to detect

More information

Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi

Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi Yunze Zeng, Parth H. Pathak, Chao Xu, Prasant Mohapatra Computer Science Department, University of California, Davis, CA,

More information

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,

More information

Session: CoSDEO 2013: Device-free Radio-based Recognition

Session: CoSDEO 2013: Device-free Radio-based Recognition CoSDEO 2013: Device-free Radio-based recognition Markus Scholz Karlsruhe Institute of Technology Vincent Priessnitz Strasse 3 Karlsruhe, Germany scholz@teco.edu Stephan Sigg TU Braunschweig Muehlenpfordtstrae

More information

Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring

Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,

More information

Indoor Robot Localization System Using WiFi Signal Measure and Minimizing Calibration Effort

Indoor Robot Localization System Using WiFi Signal Measure and Minimizing Calibration Effort IEEE ISIE 2005, June 20-23, 2005, Dubrovnik, Croatia Indoor Robot Localization System Using WiFi Signal Measure and Minimizing Calibration Effort M. Ocaña*, L. M. Bergasa*, M.A. Sotelo*, J. Nuevo*, R.

More information

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612 Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,

More information

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency

More information

Advanced Ensemble Strategies for Polynomial Models

Advanced Ensemble Strategies for Polynomial Models Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer

More information

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Mikkel Baun Kjærgaard and Carsten Valdemar Munk University of Aarhus, Department of Computer

More information

Multiuser Communications in Wireless Networks

Multiuser Communications in Wireless Networks Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: antti.tolli@ee.oulu.fi, tel. +358445000180 Course period

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

Tagoram: Real-Time Tracking of Mobile RFID Tags to High-Precision Accuracy Using COTS Devices

Tagoram: Real-Time Tracking of Mobile RFID Tags to High-Precision Accuracy Using COTS Devices Tagoram: Real-Time Tracking of Mobile RFID Tags to High-Precision Accuracy Using COTS Devices Xiang-Yang Li Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, Yunhao Liu Sep. 9, 2014 Tagoram: Real-Time

More information

Delivering broadband internet access for high speed trains passengers using the new WiFi. standard 802.11n for train-to-ground communications

Delivering broadband internet access for high speed trains passengers using the new WiFi. standard 802.11n for train-to-ground communications Delivering broadband internet access for high speed trains passengers using the new WiFi standard 802.11n for train-to-ground communications Hassan GHANNOUM 1, David SANZ 1, Bernadette VILLEFORCEIX 2,

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Top Six Considerations

Top Six Considerations Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

I. Wireless Channel Modeling

I. Wireless Channel Modeling I. Wireless Channel Modeling April 29, 2008 Qinghai Yang School of Telecom. Engineering qhyang@xidian.edu.cn Qinghai Yang Wireless Communication Series 1 Contents Free space signal propagation Pass-Loss

More information

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Tampere University of Technology Author(s) Title Citation Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Positioning with multilevel coverage area models Raitoharju, Matti; Dashti,

More information

A Microscopic Look at WiFi Fingerprinting for Indoor Mobile Phone Localization in Diverse Environments

A Microscopic Look at WiFi Fingerprinting for Indoor Mobile Phone Localization in Diverse Environments 23 International Conference on Indoor Positioning and Indoor Navigation, 28-3 st October 23 A Microscopic Look at WiFi Fingerprinting for Indoor Mobile Phone Localization in Diverse Environments Arsham

More information

Distributed forests for MapReduce-based machine learning

Distributed forests for MapReduce-based machine learning Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication

More information

Physical Layer Research Trends for 5G

Physical Layer Research Trends for 5G Physical Layer Research Trends for 5G Brett T. Walkenhorst, Ph.D. Principal Research Engineer, Georgia Tech Research Institute Adjunct Professor, Georgia Tech, School of Electrical and Computer Engineering

More information

AS MORE WIRELESS and sensor networks are deployed,

AS MORE WIRELESS and sensor networks are deployed, 2418 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks Yingying Chen, Member, IEEE, Jie Yang, Student

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method

More information

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

WiMax broadband wireless access. Wireless communication is considered one of the big engineering success stories

WiMax broadband wireless access. Wireless communication is considered one of the big engineering success stories WiMax broadband wireless access Introduction Wireless communication is considered one of the big engineering success stories over the last two decades. It is one of the rapidly changing fields that demand

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring

Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring G. Premkumar 1, C.V inoth 2, R. Srinivasan 3 Dept. of IT, PSV College of Engineering and Technology, Krishnagri,

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Enable Location-based Services with a Tracking Framework

Enable Location-based Services with a Tracking Framework Enable Location-based Services with a Tracking Framework Mareike Kritzler University of Muenster, Institute for Geoinformatics, Weseler Str. 253, 48151 Münster, Germany kritzler@uni-muenster.de Abstract.

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05 Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification

More information

Indoor Positioning Systems WLAN Positioning

Indoor Positioning Systems WLAN Positioning Praktikum Mobile und Verteilte Systeme Indoor Positioning Systems WLAN Positioning Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de Wintersemester 2015/16 WLAN Positioning

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

IEEE 802.11ac in Service Provider Wi-Fi Deployments: Consider More Than Speed

IEEE 802.11ac in Service Provider Wi-Fi Deployments: Consider More Than Speed White Paper IEEE 802.11ac in Service Provider Wi-Fi Deployments: Consider More Than Speed 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Contents

More information

A Performance Study of Wireless Broadband Access (WiMAX)

A Performance Study of Wireless Broadband Access (WiMAX) A Performance Study of Wireless Broadband Access (WiMAX) Maan A. S. Al-Adwany Department of Computer & Information Engineering, College of Electronics Engineering University of Mosul Mosul, Iraq maanaladwany@yahoo.com

More information

You will need the following pieces of equipment to complete this experiment:

You will need the following pieces of equipment to complete this experiment: UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING The Edward S. Rogers Sr. Department of Electrical and Computer Engineering ECE422H1S: RADIO AND MICROWAVE WIRELESS SYSTEMS EXPERIMENT 3:

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,

More information

Data Mining Yelp Data - Predicting rating stars from review text

Data Mining Yelp Data - Predicting rating stars from review text Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University rchada@cs.stonybrook.edu Chetan Naik Stony Brook University cnaik@cs.stonybrook.edu ABSTRACT The majority

More information

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing

More information

Analyzing Shopper s Behavior through WiFi Signals

Analyzing Shopper s Behavior through WiFi Signals Analyzing Shopper s Behavior through WiFi Signals Yunze Zeng, Parth H. Pathak, Prasant Mohapatra University of California, Davis {zeng, phpathak, pmohapatra}@ucdavis.edu ABSTRACT Substantial progress in

More information

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

Mean-Shift Tracking with Random Sampling

Mean-Shift Tracking with Random Sampling 1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of

More information

Local features and matching. Image classification & object localization

Local features and matching. Image classification & object localization Overview Instance level search Local features and matching Efficient visual recognition Image classification & object localization Category recognition Image classification: assigning a class label to

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Multihopping for OFDM based Wireless Networks

Multihopping for OFDM based Wireless Networks Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:

More information

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Comparison of Distributed and Co-located Antenna Diversity Schemes for the Coverage Improvement of VoWLAN Systems

Comparison of Distributed and Co-located Antenna Diversity Schemes for the Coverage Improvement of VoWLAN Systems Comparison of Distributed and Co-located Antenna Diversity Schemes for the Coverage Improvement of VoWLAN Systems Azadeh Ettefagh 1, Marc Kuhn 1, Barry Cheetham 2, Armin Wittneben 1 1 Swiss Federal Institute

More information

CS231M Project Report - Automated Real-Time Face Tracking and Blending

CS231M Project Report - Automated Real-Time Face Tracking and Blending CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, slee2010@stanford.edu June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS

ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number

More information

RF Coverage Validation and Prediction with GPS Technology

RF Coverage Validation and Prediction with GPS Technology RF Coverage Validation and Prediction with GPS Technology By: Jin Yu Berkeley Varitronics Systems, Inc. 255 Liberty Street Metuchen, NJ 08840 It has taken many years for wireless engineers to tame wireless

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

Bringing Mobility-Awareness to WLANs using PHY Layer Information

Bringing Mobility-Awareness to WLANs using PHY Layer Information Bringing Mobility-Awareness to WLANs using PHY Layer Information Li Sun University at Buffalo, SUNY lsun3@buffalo.edu Souvik Sen HP Labs souvik.sen@hp.com Dimitrios Koutsonikolas University at Buffalo,

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

High-fidelity electromagnetic modeling of large multi-scale naval structures

High-fidelity electromagnetic modeling of large multi-scale naval structures High-fidelity electromagnetic modeling of large multi-scale naval structures F. Vipiana, M. A. Francavilla, S. Arianos, and G. Vecchi (LACE), and Politecnico di Torino 1 Outline ISMB and Antenna/EMC Lab

More information

The ArubaOS Spectrum Analyzer Module

The ArubaOS Spectrum Analyzer Module Tech Brief Enterprise The ArubaOS Spectrum Analyzer Module The ArubaOS Spectrum Analyzer Module Tech Brief Table of Contents Introduction... 2 Visibility into the non-802.11 Spectrum... 2 Features... 3

More information

On the Performance of Wireless Indoor Localization Using Received Signal Strength

On the Performance of Wireless Indoor Localization Using Received Signal Strength Contents 12 On the Performance of Wireless Indoor Localization Using Received Signal Strength 1 12.1 Introduction................................... 1 12.2 RSS-based Localization Algorithms......................

More information

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 2007 Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Christof Röhrig and Frank

More information

Positioning with Bluetooth

Positioning with Bluetooth Positioning with Bluetooth Josef Hallberg, Marcus Nilsson, Kåre Synnes Luleå University of Technology / Centre for Distance-spanning Technology Department of Computer Science and Electrical Engineering

More information

ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE

ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform

More information

Intelligent Channel Bonding in 802.11n WLANs

Intelligent Channel Bonding in 802.11n WLANs Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. laradeek@cs.ucsb.edu, eduardg@entel.upc.edu,

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

REROUTING VOICE OVER IP CALLS BASED IN QOS

REROUTING VOICE OVER IP CALLS BASED IN QOS 1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware

More information

Wireless Data Center Network. Reporter: Green

Wireless Data Center Network. Reporter: Green Wireless Data Center Network Reporter: Green Outline What is DCN? Challenges in current DCN Cable Topology Traffic load Heterogeneous DCN Optical DCN Wireless DCN Challenges in WCDN The researches in WDCN

More information

Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS.

Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. Guidelines for Student Reports Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. A. Shariful Abstract The design of large arrays for radar applications require the

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University

More information

Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices

Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall University of Washington {kellogg, anparks, gshyam,

More information

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015 ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits

More information

Multipath fading in wireless sensor mote

Multipath fading in wireless sensor mote Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,

More information

MVA ENS Cachan. Lecture 2: Logistic regression & intro to MIL Iasonas Kokkinos Iasonas.kokkinos@ecp.fr

MVA ENS Cachan. Lecture 2: Logistic regression & intro to MIL Iasonas Kokkinos Iasonas.kokkinos@ecp.fr Machine Learning for Computer Vision 1 MVA ENS Cachan Lecture 2: Logistic regression & intro to MIL Iasonas Kokkinos Iasonas.kokkinos@ecp.fr Department of Applied Mathematics Ecole Centrale Paris Galen

More information

MIMO detector algorithms and their implementations for LTE/LTE-A

MIMO detector algorithms and their implementations for LTE/LTE-A GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

How To Perform An Ensemble Analysis

How To Perform An Ensemble Analysis Charu C. Aggarwal IBM T J Watson Research Center Yorktown, NY 10598 Outlier Ensembles Keynote, Outlier Detection and Description Workshop, 2013 Based on the ACM SIGKDD Explorations Position Paper: Outlier

More information

Integration of GPS Traces with Road Map

Integration of GPS Traces with Road Map Integration of GPS Traces with Road Map Lijuan Zhang Institute of Cartography and Geoinformatics Leibniz University of Hannover Hannover, Germany +49 511.762-19437 Lijuan.Zhang@ikg.uni-hannover.de Frank

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2 ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena

More information

Digital Wall: A Power-efficient Solution for Location-based Data Sharing

Digital Wall: A Power-efficient Solution for Location-based Data Sharing Sixth Annual IEEE International Conference on Pervasive Computing and Communications Digital Wall: A Power-efficient Solution for Location-based Data Sharing Jeffrey Junfeng Pan, Sinno Jialin Pan, Vincent

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

Neural Network Add-in

Neural Network Add-in Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...

More information

The Visual Internet of Things System Based on Depth Camera

The Visual Internet of Things System Based on Depth Camera The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed

More information